Date

By Type

By Industry

By Product Category

By Features

By Technology

By Services

By Audience

By Language

Displaying 61 to 90 of 124

Mobile Network Infrastructure Security

Download the data sheet for more details on protection for roaming, RAN, and Internet interfaces.
  • 0
  • 212

What Is the EU NIS Directive?

This paper provides an overview of the security and incident notification obligations of the EU NIS Directive and outlines how a Security Operating Platform can help.
  • 0
  • 352

AutoFocus Datasheet

Palo Alto Networks AutoFocus™ threat intelligence service re-imagines how security teams protect their organizations from unique, targeted attacks. The hosted security service provides the intelligence, analytics, and context required to understand which attacks require immediate response, as well as the ability to make indicators actionable and prevent future attacks. Read the data sheet to learn the key benefits of the AutoFocus service.
Palo Alto Networks,
  • 2
  • 15437

Expedition Transformation & Best Practices Adoption Tool

The Expedition Transformation and Best Practices Adoption Tool helps to improve your security posture by comparing your device and policy configurations against Palo Alto Networks best practices, and then automatically identifying and providing remediation recommendations.
  • 5
  • 6958

URL Filtering Privacy Datasheet

Palo Alto Networks® engaged TRUSTe®, an independent data privacy risk management provider, to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
  • 3
  • 2649

Why Certication From Palo Alto Networks Matters

Learn how certification from the fastest growing security company in the industry can benefit you.
  • 0
  • 228

Application Framework

Consume security innovations quickly and efficiently
Santa Clara, CA
  • 1
  • 16526

Security Operating Platform At A Glance

The Palo Alto Networks Security Operating Platform prevents successful cyberattacks through automation. Accurate analytics allow you to streamline routine tasks and focus on business priorities. Tight integration across the platform and with ecosystem partners delivers consistent security across cloud, network, mobile devices. Customers love our security, because it just works, consistently awarding us the highest loyalty rating in the industry. Download this At-a-Glance document to learn more.
  • 2
  • 7047

PA-500 Datasheet

Key features, performance capacities and specifications for our PA-500.
  • 9
  • 60506

EU Data Protection Compliance When Securing SaaS Applications

The purpose of this white paper is to clarify how Networks Aperture™ SaaS security service can be used in compliance with EU data protection requirements, including the upcoming EU General Data Protection Regulation.
  • 0
  • 1059

Prevention Architecture Methodology Overview

Begin your Prevention-based architecture journey
  • 1
  • 1596

Traps Datasheet

Palo Alto Networks Traps replaces traditional antivirus with a multi-method prevention approach that secures endpoints against known and unknown malware and exploits before they can compromise a system. Traps prevents security breaches and successful ransomware attacks, in contrast to detection and response after critical assets have been compromised. Traps Advanced Endpoint Protection: • Prevents cyberbreaches and successful ransomware attacks by preemptively blocking known and unknown malware, exploits and zero-day threats. • Protects and enables users to conduct their daily activities and use web-based technologies without concerns for known or unknown cyberthreats. • Automates prevention by autonomously reprogramming itself using threat intelligence gained from WildFire.
Santa Clara, CA
  • 31
  • 67047

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 88
  • 247834

Magnifier Datasheet

Magnifier Behavioral Analytics empowers organizations to quickly find and stop the stealthiest network threats. By analyzing rich network, endpoint and cloud data with machine learning, Magnifier accurately identifies targeted attacks, malicious insiders and malware. Security analysts can rapidly investigative threats and leverage the Next-Generation Firewall to block attacks before the damage is done. Download the datasheet to learn the key features and benefits of Magnifier.
  • 9
  • 13920

VM-Series on VMware

Key features, performance capacities and specifications of VM-Series for VMware.
  • 5
  • 26921

DELIVERING VM-SERIES SCALABILITY AND RESILIENCY FOR MICROSOFT AZURE

When deploying web applications in Microsoft® Azure®, the recommended approach to deliver scalability and resiliency is to utilize the cloud infrastructure, as opposed to following a traditional, physical data center approach. By leveraging native Azure-managed load balancing services, organizations can support their additional capacity and resiliency requirements.
  • 1
  • 334

Auto Scaling the VM-Series on AWS tech brief

Organizations are moving their enterprise applications onto AWS for a range of business reasons including scalability. The on-demand nature of AWS allows you to leverage core AWS features and services such as Auto Scaling and Elastic Load Balancing to build an application infrastructure that quickly and dynamically scales to address increased capacity demands dictated by inbound traffic. Common Auto Scaling scenarios include unplanned traffic spikes (e.g., time-based or seasonal variations; unplanned news events), and the addition of new applications. To ensure that your application environment is protected from cyberattacks, security will need to scale at the same pace as your workloads.
  • 0
  • 224

VM-Series on Microsoft Hyper-V

Key features, performance capacities and specifications of VM-Series on Microsoft Hyper-V
  • 0
  • 1080

Transit VPC with the VM-Series on AWS Tech Brief

Organizations are rapidly migrating their enterprise applications and data onto Amazon ® Web Services. Just as they would in the data center, applications deployed on AWS ® often require outbound connectivity to applications housed in other virtual private clouds, as well as to resources located on the corporate network or the web. As the numbers of AWS accounts and VPCs grow, managing the many individual connections becomes complex and difficult, often slowing deployments. Another challenge lies in making sure the process of protecting applications and data does not become a bottleneck for new applica - tion deployments.
  • 0
  • 3322

Hardware Replacement Services

Businesses today face an evolving array of cyberthreats that continue to gain sophistication. Therefore, your business requires a proactive approach to securing your network – one that will provide you with the assurance that you are always protected. Palo Alto Networks RMA and hardware replacement services are tailored to best fit your unique business requirements. In addition, advanced RMA services are designed specifically to help expedite the delivery of replacement hardware to minimize disruption.
  • 0
  • 3238

Australia Data Breach Guide

Cyberthreats are getting more sophisticated and prevalent, affecting society and economies. Consequently, government regulation is evolving to reflect this risk and drive confidence in the digital space. From 22 February 2018, Australian organisations that are subject to the Privacy Act will need to report data breaches to the affected parties and to the Office of the Australian Information Commissioner (OAIC). As businesses grapple with new requirements on data protection, aligning with the Notifiable Data Breach (NDB) scheme is essential. Managing this alignment successfully means not just ticking boxes, but holistically addressing their cyber risks and becoming state-of-the-art.
  • 0
  • 154

WildFire Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.
  • 2
  • 4245

Comparing the VM-Series and Security Groups

A quick review of the shared responsibilities model and how the VM-Series complements native public cloud security features such as Security Groups and Web application firewalls.
  • 2
  • 1103

PA-5000 Series Datasheet

Key features, performance capacities and specifications for our PA-5000 Series.
  • 11
  • 74690

PA-200 Datasheet

Key features, performance capacities and specifications for our PA-200.
  • 7
  • 42180

Palo Alto Networks and the E-Rate Program

An overview of Palo Alto Networks E-rate eligible products and services, and the advantages they provide for K-12 schools
  • 0
  • 485

Simplify CIPA Compliance with Palo Alto Networks (2017)

A concise summary of how Palo Alto Networks helps K-12 schools achieve CIPA compliance
  • 2
  • 1415

Palo Alto Networks Service Level Objectives

Palo Alto Networks Service Level Objectives ensure our commitment to using commercially reasonable efforts to make GlobalProtect Cloud service and Logging Service available as indicated.
  • 0
  • 866

Palo Alto Networks Authorized Support Center Program

When problems arise, Palo Alto Networks and our Authorized Support Center (ASC) partners are there to quickly and proficiently resolve any technical support issues or challenges that may arise.
  • 0
  • 1528

GlobalProtect Datasheet

The world you need to secure continues to expand as both users and applications shift to locations outside the traditional network perimeter. Security teams face challenges with maintaining visibility into network traffic and enforcing security policies to stop threats. Traditional technologies used to protect mobile endpoints, such as host endpoint antivirus software and remote access VPN, are not capable of stopping the advanced techniques employed by today’s more sophisticated attacker. GlobalProtect™ network security client for endpoints, from Palo Alto Networks®, enables organizations to protect the mobile workforce by extending the Next-Generation Security Platform to all users, regardless of location. It secures traffic by applying the platform’s capabilities to understand application use, associate the traffic with users and devices, and enforce security policies with next-generation technologies.
  • 4
  • 49855
Displaying 61 to 90 of 124